{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:39:26Z","timestamp":1725446366981},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/ijcnn.2008.4634331","type":"proceedings-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T20:31:26Z","timestamp":1222720286000},"page":"3717-3722","source":"Crossref","is-referenced-by-count":0,"title":["A methodology for finding source-level vulnerabilities of the Linux kernel variables"],"prefix":"10.1109","author":[{"family":"Jaekwang Kim","sequence":"first","affiliation":[]},{"family":"Jee-Hyong Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"a critical analysis of vulnerability taxonomies","author":"bishop","year":"1996","journal-title":"CSE-96-11"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004368"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286496"},{"key":"13","article-title":"using cqual for static analysis of authorization hook placement","author":"zhang","year":"2002","journal-title":"Proc of the 11 th USENIX Security Symposium"},{"key":"14","article-title":"checking system rules using system-specific, programmer-written compiler extensions","author":"engler","year":"2000","journal-title":"Proc 4th USENIX OSDI"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028917"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1109\/ICSM.2002.1167766","article-title":"maintaining software with a security perspective","author":"jiwnani","year":"2002","journal-title":"International Conference on Software Maintenance(ICSM'02)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545188"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857596"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352624"},{"year":"0","key":"25"},{"key":"3","article-title":"toward a secure system engineering methodology","author":"salter","year":"1998","journal-title":"New Security Paradigms Workshop"},{"key":"2","first-page":"77","article-title":"the rising threat of vulnerabilities due to integer errors","author":"arce","year":"2003","journal-title":"IEEE Security & Privacy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"article-title":"a survey of software fault surveys","year":"1990","author":"marick","key":"1"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986583"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020198"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586142","article-title":"mops: an infrastructure for examining security properties of software","author":"chen","year":"2002","journal-title":"CCS'02"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,8]]}},"container-title":["2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625775\/4633757\/04634331.pdf?arnumber=4634331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T12:09:59Z","timestamp":1497787799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4634331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2008.4634331","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}